Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.106.230.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42714
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.106.230.58.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 00:05:05 CST 2025
;; MSG SIZE  rcvd: 105
Host info
58.230.106.2.in-addr.arpa domain name pointer 2-106-230-58-dynamic.dk.customer.tdc.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
58.230.106.2.in-addr.arpa	name = 2-106-230-58-dynamic.dk.customer.tdc.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
36.34.162.185 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-02 02:45:44
101.205.52.155 attack
1433/tcp
[2020-05-01]1pkt
2020-05-02 02:44:55
92.253.171.172 attack
May  1 13:51:12 vps333114 sshd[362]: Invalid user pi from 92.253.171.172
May  1 13:51:12 vps333114 sshd[364]: Invalid user pi from 92.253.171.172
...
2020-05-02 02:30:04
181.129.151.154 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-02 02:22:51
111.229.206.193 attack
2020-05-01T14:28:07.710086Z dca9dc567d96 New connection: 111.229.206.193:33170 (172.17.0.5:2222) [session: dca9dc567d96]
2020-05-01T14:32:42.057287Z bdbb6a8fd103 New connection: 111.229.206.193:43014 (172.17.0.5:2222) [session: bdbb6a8fd103]
2020-05-02 02:59:07
41.215.253.70 attackbots
Unauthorized connection attempt from IP address 41.215.253.70 on Port 445(SMB)
2020-05-02 02:43:18
104.203.242.109 attackbotsspam
29257/tcp
[2020-05-01]1pkt
2020-05-02 02:37:06
42.247.35.1 attack
1433/tcp 1433/tcp
[2020-05-01]2pkt
2020-05-02 02:57:04
183.82.219.142 attack
445/tcp
[2020-05-01]1pkt
2020-05-02 02:27:12
114.33.130.95 attackbots
23/tcp
[2020-05-01]1pkt
2020-05-02 02:56:32
80.35.88.21 attack
445/tcp
[2020-05-01]1pkt
2020-05-02 02:18:42
15.84.221.37 attack
May 01 07:35:17 tcp        0      0 r.ca:22            15.84.221.37:32803          SYN_RECV
2020-05-02 02:25:56
192.144.136.109 attackspambots
Automatic report BANNED IP
2020-05-02 02:34:10
193.187.116.213 attackspam
SSH brute-force: detected 22 distinct usernames within a 24-hour window.
2020-05-02 02:41:53
149.56.26.16 attack
May  1 19:16:37 roki-contabo sshd\[19565\]: Invalid user joseph from 149.56.26.16
May  1 19:16:37 roki-contabo sshd\[19565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.26.16
May  1 19:16:39 roki-contabo sshd\[19565\]: Failed password for invalid user joseph from 149.56.26.16 port 34892 ssh2
May  1 19:26:54 roki-contabo sshd\[19755\]: Invalid user david from 149.56.26.16
May  1 19:26:54 roki-contabo sshd\[19755\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.26.16
...
2020-05-02 02:33:14

Recently Reported IPs

30.131.113.125 4.58.174.254 189.203.219.179 204.78.85.122
237.90.220.81 130.139.220.209 33.162.172.182 243.54.27.197
35.166.21.1 215.0.138.212 142.236.151.29 232.251.207.130
224.127.250.229 145.91.19.46 62.247.235.30 79.190.174.203
96.94.106.6 114.168.197.84 147.12.236.55 242.165.243.204